Hmm, I'm not sure about F. Wouldn't that just be internal information for the security team? I'd focus on the external indicators that could help identify the phishing source.
Ha! I bet the security team would also want to know the 'state of the phishing email' - you know, like if it was opened, clicked, or forwarded. That's a good one, C!
A, D, and E for sure. I mean, that's the basic info you'd want to capture, right? The URLs, IPs, and file hashes could be clues to the source of the phishing attack.
Art
2 months agoLorrine
2 months agoYolande
29 days agoAmber
1 months agoCarissa
1 months agoLucia
2 months agoDevora
2 months agoJamika
2 months agoBrittney
1 months agoErick
2 months agoWilda
2 months agoLatanya
2 months agoAnastacia
3 months agoSolange
2 months agoLigia
2 months agoLeontine
2 months ago